必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): PACE

主机名(hostname): unknown

机构(organization): The Aerospace Corporation

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 130.221.140.32
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31207
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;130.221.140.32.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019061101 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed Jun 12 09:59:30 CST 2019
;; MSG SIZE  rcvd: 118

HOST信息:
Host 32.140.221.130.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 32.140.221.130.in-addr.arpa: NXDOMAIN

相关IP信息:
最新评论:
IP 类型 评论内容 时间
59.1.116.20 attack
Aug 22 23:51:40 mail sshd\[47595\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.1.116.20  user=root
...
2019-08-23 12:25:10
139.99.201.100 attackbots
Aug 22 21:24:49 lnxmysql61 sshd[26727]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.201.100
2019-08-23 12:38:51
134.209.81.63 attack
Aug 22 23:10:27 legacy sshd[9909]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.81.63
Aug 22 23:10:29 legacy sshd[9909]: Failed password for invalid user r from 134.209.81.63 port 33550 ssh2
Aug 22 23:15:11 legacy sshd[10006]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.81.63
...
2019-08-23 12:22:41
104.248.150.23 attack
Aug 22 21:52:10 hb sshd\[17743\]: Invalid user google from 104.248.150.23
Aug 22 21:52:10 hb sshd\[17743\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.150.23
Aug 22 21:52:12 hb sshd\[17743\]: Failed password for invalid user google from 104.248.150.23 port 39986 ssh2
Aug 22 21:57:03 hb sshd\[18201\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.150.23  user=root
Aug 22 21:57:05 hb sshd\[18201\]: Failed password for root from 104.248.150.23 port 58024 ssh2
2019-08-23 12:50:55
187.35.191.231 attackspam
Aug 23 05:47:24 icinga sshd[31155]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.35.191.231
Aug 23 05:47:25 icinga sshd[31155]: Failed password for invalid user lorelei from 187.35.191.231 port 45434 ssh2
...
2019-08-23 12:37:57
185.175.93.105 attackbotsspam
08/23/2019-00:39:17.675519 185.175.93.105 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-08-23 12:54:51
118.143.198.3 attackspambots
Aug 22 20:14:41 hcbbdb sshd\[2505\]: Invalid user elsa from 118.143.198.3
Aug 22 20:14:41 hcbbdb sshd\[2505\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.143.198.3
Aug 22 20:14:43 hcbbdb sshd\[2505\]: Failed password for invalid user elsa from 118.143.198.3 port 49975 ssh2
Aug 22 20:19:22 hcbbdb sshd\[3014\]: Invalid user psanborn from 118.143.198.3
Aug 22 20:19:22 hcbbdb sshd\[3014\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.143.198.3
2019-08-23 12:41:26
5.148.3.212 attackbots
ssh failed login
2019-08-23 12:51:45
80.211.51.116 attackbotsspam
Aug 22 22:37:57 yabzik sshd[31169]: Failed password for root from 80.211.51.116 port 58416 ssh2
Aug 22 22:42:02 yabzik sshd[32677]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.51.116
Aug 22 22:42:04 yabzik sshd[32677]: Failed password for invalid user bruce from 80.211.51.116 port 47724 ssh2
2019-08-23 12:23:40
202.51.106.118 attack
Aug 22 19:10:50 lcdev sshd\[14467\]: Invalid user dattesh from 202.51.106.118
Aug 22 19:10:50 lcdev sshd\[14467\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.51.106.118
Aug 22 19:10:53 lcdev sshd\[14467\]: Failed password for invalid user dattesh from 202.51.106.118 port 60940 ssh2
Aug 22 19:16:21 lcdev sshd\[15021\]: Invalid user livesupport from 202.51.106.118
Aug 22 19:16:21 lcdev sshd\[15021\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.51.106.118
2019-08-23 13:16:48
188.92.77.12 attackspam
Aug 22 18:59:51 php1 sshd\[28817\]: Invalid user 0 from 188.92.77.12
Aug 22 18:59:51 php1 sshd\[28817\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.92.77.12
Aug 22 18:59:53 php1 sshd\[28817\]: Failed password for invalid user 0 from 188.92.77.12 port 37706 ssh2
Aug 22 19:00:00 php1 sshd\[28833\]: Invalid user 22 from 188.92.77.12
Aug 22 19:00:00 php1 sshd\[28833\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.92.77.12
2019-08-23 13:03:09
112.85.42.194 attack
Aug 23 07:22:26 dcd-gentoo sshd[19855]: User root from 112.85.42.194 not allowed because none of user's groups are listed in AllowGroups
Aug 23 07:22:29 dcd-gentoo sshd[19855]: error: PAM: Authentication failure for illegal user root from 112.85.42.194
Aug 23 07:22:26 dcd-gentoo sshd[19855]: User root from 112.85.42.194 not allowed because none of user's groups are listed in AllowGroups
Aug 23 07:22:29 dcd-gentoo sshd[19855]: error: PAM: Authentication failure for illegal user root from 112.85.42.194
Aug 23 07:22:26 dcd-gentoo sshd[19855]: User root from 112.85.42.194 not allowed because none of user's groups are listed in AllowGroups
Aug 23 07:22:29 dcd-gentoo sshd[19855]: error: PAM: Authentication failure for illegal user root from 112.85.42.194
Aug 23 07:22:29 dcd-gentoo sshd[19855]: Failed keyboard-interactive/pam for invalid user root from 112.85.42.194 port 31653 ssh2
...
2019-08-23 13:23:22
79.17.4.197 attackbotsspam
Aug 22 22:23:01 www sshd\[5540\]: Invalid user michey from 79.17.4.197Aug 22 22:23:03 www sshd\[5540\]: Failed password for invalid user michey from 79.17.4.197 port 37636 ssh2Aug 22 22:24:50 www sshd\[5545\]: Invalid user nu from 79.17.4.197
...
2019-08-23 12:38:22
177.92.165.125 attack
Aug 23 07:59:33 www5 sshd\[13018\]: Invalid user usuario1 from 177.92.165.125
Aug 23 07:59:33 www5 sshd\[13018\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.92.165.125
Aug 23 07:59:34 www5 sshd\[13018\]: Failed password for invalid user usuario1 from 177.92.165.125 port 53774 ssh2
...
2019-08-23 13:24:19
45.6.72.17 attackbots
Aug 23 06:54:49 legacy sshd[22785]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.6.72.17
Aug 23 06:54:52 legacy sshd[22785]: Failed password for invalid user test from 45.6.72.17 port 52362 ssh2
Aug 23 07:00:00 legacy sshd[22928]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.6.72.17
...
2019-08-23 13:06:22

最近上报的IP列表

223.30.30.49 129.97.6.86 109.173.74.104 175.190.87.212
106.8.168.155 120.194.13.109 122.28.82.38 84.174.10.122
103.17.244.48 27.22.60.144 184.229.169.72 27.243.235.231
68.228.35.119 32.52.8.92 188.142.142.128 154.181.54.255
5.234.204.20 162.165.225.38 18.95.28.204 191.197.225.233